TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Improved Digital Certificate Security

141 pointsby mikecarltonover 9 years ago

10 comments

gleennover 9 years ago
What is a "Symantec-internal testing process" that leads to Google certs being leaked outside of Symantec? Is some engineer poking around and just used "google.com" as an example? Seems like a pretty serious wtf moment. If I was Google I would be pissed.
评论 #10246704 未加载
评论 #10246725 未加载
评论 #10246690 未加载
评论 #10246732 未加载
fulafelover 9 years ago
One has to wonder how much of these CA shenanigans have been going on before these news sytems were put in place systems to catch the rogue certificates.<p>It would stand to reason that people are more wary of it now that there is a high risk of getting caught.
评论 #10247041 未加载
vonklausover 9 years ago
After reading DrDuh&#x27;s guide to install yosemite, I thought a bit more about the ~200+ trusted CAs on my computer. I removed about ~50 using various heuristics, mostly arbitrary stuff like removing goverment agencies, and international CAs that I was skeptical of or otherwise assumed I would not need.<p>To get to my question though, how many CAs does one need to trust for the safest browsing experience? What CAs should be trusted and how can they be evaluated? How many-ish are you guys trusting?
评论 #10248274 未加载
评论 #10250152 未加载
评论 #10248320 未加载
tomfitzover 9 years ago
<a href="https:&#x2F;&#x2F;api.ctwatch.net&#x2F;domain&#x2F;ycombinator.com" rel="nofollow">https:&#x2F;&#x2F;api.ctwatch.net&#x2F;domain&#x2F;ycombinator.com</a> is an RSS feed of all issued certificates for ycombinator.com and its subdomains.<p>Feel free to use that to check your own site&#x27;s certificates!<p>(It&#x27;s possible to directly query the multiple Certificate Transparency log servers for your site&#x27;s certs, but non-trivial, hence why I implemented the above functionality.)<p>Code: <a href="https:&#x2F;&#x2F;github.com&#x2F;certificate-transparency-watch&#x2F;" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;certificate-transparency-watch&#x2F;</a>
评论 #10248432 未加载
lisperover 9 years ago
Wtf is a &quot;pre-certificate&quot;?
评论 #10246800 未加载
评论 #10246735 未加载
rspeerover 9 years ago
This article was already posted, without the mobile formatting.
评论 #10247694 未加载
sgentleover 9 years ago
Is this a different situation to the CNNIC Google cert issued earlier in the year? If so, how?
评论 #10246818 未加载
评论 #10246709 未加载
blueflowover 9 years ago
This is not a &quot;improvement&quot;, they just fixed something going really wrong.
sidcoolover 9 years ago
One has to commend Google on its transparency on the matter.
mmaunderover 9 years ago
That&#x27;s the problem with TLS trust: All it does is tell a browser that a CA trusts the certificate. The process to verify site ownership varies and is error prone.